Professional Documents
Culture Documents
net/publication/241849825
CITATIONS READS
3 36,765
1 author:
Imran Khan
Zakir Husain Delhi College (University of Delhi), New Delhi
28 PUBLICATIONS 28 CITATIONS
SEE PROFILE
All content following this page was uploaded by Imran Khan on 27 August 2014.
Article information:
To cite this document: Imran Khan, "An introduction to computer viruses: problems and solutions", Library Hi Tech News, Vol. 29
Iss: 7 pp. 8 - 12
Permanent link to this document:
http://dx.doi.org/10.1108/07419051211280036
Downloaded on: 01-10-2012
References: This document contains references to 5 other documents
To copy this document: permissions@emeraldinsight.com
Access to this document was granted through an Emerald subscription provided by Emerald Author Access
For Authors:
If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service.
Information about how to choose which publication to write for and submission guidelines are available for all. Please visit
www.emeraldinsight.com/authors for more information.
About Emerald www.emeraldinsight.com
With over forty years' experience, Emerald Group Publishing is a leading independent publisher of global research with impact in
business, society, public policy and education. In total, Emerald publishes over 275 journals and more than 130 book series, as
well as an extensive range of online products and services. Emerald is both COUNTER 3 and TRANSFER compliant. The organization is
a partner of the Committee on Publication Ethics (COPE) and also works with Portico and the LOCKSS initiative for digital archive
preservation.
*Related content and download information correct at time of download.
An introduction to computer viruses: problems
and solutions
Imran Khan
Introduction virus” is also commonly but erroneously There are many subtle and obvious
used to refer to other types of malware, distinctions that set the different types of
The development of large-scale adware, and spyware programs that do computer viruses apart from one
complex campus networks needs to be not have this reproductive ability. another. Some of the more typical
concerned with network security so Malware includes worms, Trojans, viruses are described below.
that the campus network remains stable. most rootkits, spyware, dishonest “Resident viruses” exist in a
In today’s information age, the pool of adware, crimeware, and other computer’s volatile memory (RAM).
information available continues to expand unwanted software, including true From there it can overcome and
logarithmically. Digital information has viruses. Viruses are sometimes interrupt all of the operations executed
transformed the way we create, transmit, confused with computer worms and by the system like corrupting files and
store, process and manipulate Trojan horses, which are technically programs that are opened, closed,
information. All the electronic resources different. A worm can exploit security copied, renamed, etc. Examples of this
and information are being stored in vulnerabilities to spread itself to other type of virus include Randex, CMJ,
computer systems for their retrieval and computers through networks, while a Meve, and MrKlunky.
dissemination. In today’s highly computer Trojan is a program that appears Multipartite viruses are distributed
dependant environment, computer harmless but hides malicious functions. through infected media and usually hide
security is a major concern. The security Worms and Trojans, like viruses, may in the memory. Gradually, the virus
of computers is routinely threatened by harm a computer system’s data or moves to the boot sector of the hard
malicious programs such as computer performance. A true virus can only drive and infects executable files on the
viruses, Trojan horses, worms and the like. spread from one computer to another hard drive and later across the computer
Once computers are infected these (in some form of executable code) when system.
programs may have the ability to its host is taken to the target computer; “Direct action viruses” replicate and
damage expensive computer hardware, for instance because a user sent it over take action when executed. When a
destroy valuable data, tie up limited a network or the internet, or carried it specific condition is met, the virus
computing resources or compromise the on a removable medium such as a comes into action and infects files in
security of sensitive information. People floppy disk, CD, DVD, or USB drive. the directory or folder that it is in and in
accumulate data from many sources using Transmission of viruses can increase by directories that are specified in the
various available electronic storage infecting files on a network file system AUTOEXEC.BAT file PATH. This
devices such as USB drives, CD/DVD- or a file system that is accessed by batch file is always located in the root
ROMs, etc. and then store the data on their another computer. Computer viruses directory of the hard disk and carries out
computers. Many people are not fully were labeled as viruses because of the certain operations when the computer is
computer literate and may be unaware of fact that they are similar to biological booted.
the latest virus threats. When users move viruses in the aspect of multiplying “Overwrite viruses” are characterized
or copy data from computer to computer themselves. Similarly they find a host by the fact that they delete the information
viruses can be transmitted via computer and then infect and multiply themselves. contained in the files that it infects,
systems, an internal network or the However, in both cases there must be a rendering them partially or totally
internet. Once a computer system gets cause in order for the problem to begin. useless once they have been infected.
infected with a virus, the data stored in it Some viruses and other malware have The only way to clean a file infected by
becomes insecure and the system symptoms noticeable to the computer an overwrite virus is to delete the file
becomes a source of infection to other user, but many are surreptitious and go completely, thus losing the original
systems during the transfer of data. unnoticed. content. Examples of this virus include
There are different types of computer Way, Trj.Reboot, Trivial.88.D.
Computer viruses and related viruses and each type has their own “Boot sector viruses” affect the boot
malware unique features that differentiate sector of a floppy, USB or hard disk
themselves from one another. Among drive. This is a crucial part of a disk, in
A computer virus is a computer the different types of viruses the most which information on the disk itself is
program that can replicate itself and familiar ones are computer-based stored together with a program that
infect a computer. The term “computer viruses and internet-based viruses. makes it possible to boot (start) the
8 Library Hi Tech News Number 7 2012, pp. 8-12, q Emerald Group Publishing Limited, 0741-9058, DOI 10.1108/07419051211280036
computer from the disk. Examples of depending on the actions that they names begin with letters in a certain
boot sector viruses include Polyboot.B, carry out. The virus may completely range of the alphabet.
AntiEXE. overwrite the file that it infects, or may “Spacefiller (cavity) viruses”, install
“Macro viruses” infect files that are only replace parts of the file, or may not themselves within the empty spaces of
created using certain applications or replace anything but instead rewrite the the code of the code of some programs
programs that contain macros. The file so that the virus is executed rather while not damaging the actual program
different ways to create macros would than the program the user intended. itself. An advantage of this is that the
be the macro recorder or Visual Basic The “encrypted virus” is probably the virus then does not increase the length
for Applications. Macro Virus uses the most difficult kind of bug to detect and of the program and can avoid the need
macro language for its program. the most difficult to stop. One may for some stealth techniques. The Lehigh
Microsoft Office has macros built into accidentally have downloaded one of virus is an early example of a spacefiller
its application and this virus affects so these bugs and before knowing it; the virus.
most of its application programs. Word entire computer can be infected. Many “FAT viruses” use the file allocation
Documents, Excel Spreadsheets, Power top virus protection programs miss table or FAT part of a disk used to
Point Presentations, and Access encrypted viruses because these bugs connect information and is vital to
Databases are most at risk. The use a different form of encryption every normal functioning of the computer.
document template is affected and time. In most cases virus protection This type of virus attack can be
hence every file that is opened is software can then identify and prevent especially dangerous, by preventing
affected. Some macro viruses contain a damage. access to certain sections of the hard
trigger that is usually a date on which “Companion viruses” have the name drive where important files are stored.
the virus is programmed to start the because once they get into the system Damage caused can result in
actual damage. Some other macro they “accompany” the other files that information losses from individual files
viruses share the characteristics of a already exist. In other words, in order to or even entire directories.
computer worm by spreading across carry out their infection routines, “Worms” are technically not viruses,
networks by using the macro facility companion viruses can wait in memory but they have the ability to self-
available in Microsoft Outlook. until a program is run (resident viruses) replicate, and can lead to negative
Examples of macro viruses are Relax, effects on the computer system but
or act immediately by making copies of
Melissa.A, Bablas, O97M/Y2K. usually they are detected and eliminated
themselves (direct action viruses).
“Directory viruses” change the paths by antiviruses. Clicking on an infected
Some examples of this type include
that indicate the location of a file. By e-mail usually transmits worms.
Stator, Asimov.1539, and Terrax.1069.
executing a program (file with the Examples of worms include
“Network viruses” rapidly spread
extension. EXE or .COM) that has PSWBugbear.B, Lovgate.F, Trile.C,
through a local area network (LAN),
been infected by a virus, one may Sobig.D, Mapson.
and sometimes over the internet. “Trojans or Trojan horses” are
unknowingly be running the virus
program, while the virus has previously Generally, network viruses multiply malicious codes (not viruses) as they
moved the original file and program. through shared resources, i.e. shared do not reproduce by infecting other files,
Once infected, it becomes impossible to drives and folders. When the virus nor do they self-replicate like worms.
locate the original files. infects a computer, it searches through A Trojan horse program has the
“Polymorphic viruses” encrypt or the network to attack new potential appearance of having a useful and
encode themselves in a different way prey. When the virus finishes infecting desired function. While it may
(using different algorithms and a computer, it moves on to the next and advertise its activity after launching,
encryption keys) every time they the cycle repeats itself. The most this information is not apparent to the
infect a system. This makes it dangerous network viruses are Nimda user beforehand. Secretly, the program
impossible for less sophisticated and SQLSlammer. performs other undesired functions.
antivirus software to find them using “Nonresident viruses” are similar to Trojan horses may cause data
string or signature searches (because resident viruses as they use the destruction or compromise a system by
they are different in each encryption) replication of a computer module. providing a means for another computer
and also enables them to create a large These viruses selects one or more files to gain access, thus bypassing normal
number of copies of themselves. to infect each time the module is access controls. Trojan horse attacks are
Examples of this type include Elkern, executed. one of the most serious threats to
Marburg, Satan Bug, and Tuareg. “Stealth viruses” try to trick computer security as they can be
“File infectors” are viruses that antivirus software by intercepting its spread in the guise of literally
infect programs or executable files requests to the operating system. It has anything, which makes it almost
(files with an .EXE, .DRV, .DLL, the ability to avoid detection from some essentially impossible to notice them,
.BIN or .COM extension). When one antivirus software programs. even when one is looking specifically
of these programs is run, directly or “Sparse infectors” minimize the for them.
indirectly, the virus is activated, probability of being discovered by “Logic bombs” are also not viruses
producing the damaging effects it is various means such as only infecting but rather camouflaged segments of
programmed to carry out. The majority every 20th time a file is executed; only other programs. Their objective is to
of existing viruses belongs to this infecting files whose lengths are within destroy data on the computer once
category, and can be classified narrowly defined ranges or whose certain conditions have been met. Logic